This is an overview of the layout in which KGE works.
- Get User String (Round 0)
- Split String Into Pairs
- If Not Enough Then Add Specially Made Character Which Is Deleted During Decryption
- Use Byte Substitution
- Switch User Strings To IDs and Find Replacement Term For Each Key
- To Find Replacements For Each Key, Use Cipher w=x^n+(y*n^2)/Y, where w is the first character to the new key, x is the first old character key, y is the second old character key and n is the second new character key, obtained from n=(round*y/x)^2, where the round is 100 at 0 and 1 at Round One, 2 at Round 2, etc. N is then divided by 220 (Cipher Only Allows 33-126, 128-255)
- This Equation Will Likely Be Changed
- Always Round To Zero
- Switch Pair Placement
- Get IV I if Round is 0 or Even and IV II if Round Is Odd
- Split To Pairs
- Change Order By First Pair To Last, Last Pair To Third and Fourth Pair To 6th, Then Flip All Characters For Next Loop
- Turn To IDs and repeat 256*x until the ID is reached, always round
- Obfuscate (Start Of Round 1-20)
- Get First 5 ID Pairings, for each pair, add the pair second to it, subtract the pair third to it, divide the pair fourth to it and multiply the pair fifth/password pieces relative to it. Treat as if string loops twice (makes more sense in example). Reference by IDs, not actual text.
- Get Result From Obfuscation And Split
- Always split into threes and use special character when needed, Just Reference The Example
- Switch Pair Placement
- Get IV I if Round is 0 or Even and IV II if Round Is Odd
- Split To Pairs
- Change Order By First Pair To Last, Last Pair To Third and Fourth Pair To 6th, Then Flip All Characters For Next Loop
- Turn To IDs and repeat 256*x until the ID is reached, always round
- Obfuscate
- Get ID Pairings, for each pair, add the pair second to it, subtract the pair third to it, divide the pair fourth to it and multiply the pair fifth to it. Treat as if string loops twice (makes more sense in example). Reference by IDs, not actual text.
- Repeat Steps 2 then 6 - 8 20 Times (End Of Round 1-20)
- Turn End Result Into List of IDs In List (Start Of Round 21)
- Always in trios, if number is missing y/z value, use 0 and 0.
- Pair All Strings (Threes) And Graph All Points
- Find All Possible Paths Between All Points Given, Adding An Artificial Range
- Use First IV character at Round 20 as x asymptope, use First IV II character at Round 20 as y asymptope, use Last IV I Character at Round 20 as Domain Minimum and Last IV II Character at Round 20 As Range Minimum. Remove Domain and Range if needed.
- Get Intersection Points and Reference Degree Of “Father” Line Within Key
- Cipher All Reference Points Using IV I and II as well as Password I and II
- Add Dummy Points Using Parabolic Area And Cone Area Equation.
Example (Not Made To Fit Math IRL, Visual Example):
IV I and IV II
- mRxL6X3Rc2xWO1BNd3sY
- ihcqh4LMCWg0wDtPm05F
Password I and II
- Go Mets, Oh Yeah
- Get A Home Run, Baby
- “Sword Art Online”
- Sw or d_ Ar t_ On li ne
93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | |
93 | xx | xx | xx | xx | xx | xx | xx | xx |
94 | xx | xx | xx | xx | xx | xx | xx | xx |
95 | xx | xx | xx | xx | xx | xx | xx | 4m |
96 | xx | xx | xx | xx | xx | xx | xx | xx |
97 | xx | xx | xx | xx | xx | xx | xx | xx |
98 | xx | xx | xx | xx | xx | xx | xx | xx |
99 | xx | xx | xx | xx | xx | xx | xx | xx |
100 | xx | xx | xx | xx | xx | xx | xx | xx |
w=x^n+(y*n^2)/Y, n=(round*y/x)^2
X = 100
Y = 95
Round = 100
N = (100*95/100)^2
= 9025/220
=41
N=41
W=100^41+(95*41^2)/95
=15
(Create Better Equation, Do by 256 for special equation?)
4. xL6X3Rc2xWO1BNd3sYmR
xL6XsY3Rc2xWO1BNd3mR
xL6XsYc2xW3RO1BNd3mR
Rm3dNB1OR3Wx2cYsX6Lx
5.
IV Pair (ID) | Add | Subtract | Divide | Multiply | Multiply |
mR | xL | 6X | c2 | 3R | Password Piece |
xL | 6X | 3R | xW | c2 | Password Piece |
6X | 3R | c2 | O1 | xW | Password Piece |
3R | c2 | xW | BN | O1 | Password Piece |
c2 | xW | O1 | d3 | BN | Password Piece |
1pv7eeuc926
6. 1pv 7ee uc9 26-
7. mRxL6X3Rc2xWO1BNd3sY
xL6X3Rc2xWO1BNd3sYmR
xL6XsY3Rc2xWO1BNd3mR
xL6XsYc2xW3RO1BNd3mR
Rm3dNB1OR3Wx2cYsX6Lx (End Result)
8.
IV Pair (ID) | Add | Subtract | Divide | Multiply | Multiply |
mR | xL | 6X | c2 | 3R | Password Piece |
xL | 6X | 3R | xW | c2 | Password Piece |
6X | 3R | c2 | O1 | xW | Password Piece |
3R | c2 | xW | BN | O1 | Password Piece |
c2 | xW | O1 | d3 | BN | Password Piece |
9.
bwt1dj1WB6oXAUfAKOxL guL4bkjGw7IyONSgeTOX ZmcCirx9YMPHMPUkMMVw Cftq6hlcEcAUS1aBTDM8 jpU7brH3dc671ObDHg7m IFp3pxtIyEnvgNxu2XL2 psBgSD6QtGozZBWfiPjK icRm9zTfPz4kqshyhRyU sGnYb3VkCv7oaggnQsi1 Aw78vfDHgexHJzsBwMy7 Pshd5gHwU9bDskWd24AQ ADbA69aS15ZVdYjnFWpY VXVro3daBwd87QgvpVGR 7r1lA7DvPHKnJcolhben JjO8dwWmIUNLftzgnLyd 3jv8m5cHtdjei6GXHiKn KKGujZ4b4f7iugch4nX4 EkM2AxWnaggkJB4AEDsc v5orF35MB9UPm5ZoBusO jf0QA2IvNrquIxmr1Fjh
10. 98 119 116 49 100 106 49 87 66 54 111 88 65 85 102 65 75 79 120 76 10 103 117 76 52 98 107 106 71 119 55 73 121 79 78 83 103 101 84 79 88 10 90 109 99 67 105 114 120 57 89 77 80 72 77 80 85 107 77 77 86 119 10 67 102 116 113 54 104 108 99 69 99 65 85 83 49 97 66 84 68 77 56 10 106 112 85 55 98 114 72 51 100 99 54 55 49 79 98 68 72 103 55 109 10 73 70 112 51 112 120 116 73 121 69 110 118 103 78 120 117 50 88 76 50 10 112 115 66 103 83 68 54 81 116 71 111 122 90 66 87 102 105 80 106 75 10 105 99 82 109 57 122 84 102 80 122 52 107 113 115 104 121 104 82 121 85 10 115 71 110 89 98 51 86 107 67 118 55 111 97 103 103 110 81 115 105 49 10 65 119 55 56 118 102 68 72 103 101 120 72 74 122 115 66 119 77 121 55 10 80 115 104 100 53 103 72 119 85 57 98 68 115 107 87 100 50 52 65 81 10 65 68 98 65 54 57 97 83 49 53 90 86 100 89 106 110 70 87 112 89 10 86 88 86 114 111 51 100 97 66 119 100 56 55 81 103 118 112 86 71 82 10 55 114 49 108 65 55 68 118 80 72 75 110 74 99 111 108 104 98 101 110 10 74 106 79 56 100 119 87 109 73 85 78 76 102 116 122 103 110 76 121 100 10 51 106 118 56 109 53 99 72 116 100 106 101 105 54 71 88 72 105 75 110 10 75 75 71 117 106 90 52 98 52 102 55 105 117 103 99 104 52 110 88 52 10 69 107 77 50 65 120 87 110 97 103 103 107 74 66 52 65 69 68 115 99 10 118 53 111 114 70 51 53 77 66 57 85 80 109 53 90 111 66 117 115 79 10 106 102 48 81 65 50 73 118 78 114 113 117 73 120 109 114 49 70 106 104
11. ((6 Point Example)
There are more steps to be added but a Github Repository will soon be opened with an example made using Unity Bolt and a Python Pipeline!
Discussions
Become a Hackaday.io Member
Create an account to leave a comment. Already have an account? Log In.